CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.
Metrics
Affected Vendors & Products
References
History
Fri, 16 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:nasa:cryptolib:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 13 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 12 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nasa
Nasa cryptolib |
|
| Vendors & Products |
Nasa
Nasa cryptolib |
Sat, 10 Jan 2026 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3. | |
| Title | CryptoLib Memory Leak in KMC Encrypt Function Leads to Resource Exhaustion | |
| Weaknesses | CWE-401 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-10T00:19:16.006Z
Updated: 2026-01-13T20:08:55.439Z
Reserved: 2026-01-05T22:30:38.718Z
Link: CVE-2026-22024
Updated: 2026-01-13T20:08:44.535Z
Status : Analyzed
Published: 2026-01-10T01:16:18.553
Modified: 2026-01-16T16:44:36.080
Link: CVE-2026-22024
No data.